Академический Документы
Профессиональный Документы
Культура Документы
977
Tn = 21n
A,
(C3) Distributivity of w.r.t.
(A B) C = (A C) (B C)
(C4) Distributivity of w.r.t.
A (B C) = (A B) (A C)
(C5) Associativity of state-transition
(A B) C = A (B C) = A B C.
For notation convenience, a (state) transition A B will be
denoted tA,B . It is important to note that the order of indexes
does matter because tA,B 6= tB,A in general, but if A = B
1 Actually, Shafers model, considering all elements of the frame as truly
exclusive, can be viewed as a special case of hybrid model.
tX tY = tXY .
(1)
A,
(C2) Impossible (backward) state-transition
z
}|
{
= 2 . . .
978
(3)
T2 =212
m(B)
A,BTn ;AB6=
P l(A) =
X
A,BTn ,AB
|A B|
m(B)
|B|
(4)
979
(5)
where X1 21 and X2 22 .
For simplicity and in our application, we consider that the
frames are all the same; that is 1 = 2 = . . . = n =
. This simple conjunctive rule can be extended easily for
combining n sequential sources of evidence as follows:
2) Combination rule in the constrained model of transitions: In the constrained model of transitions, one knows that
some kinds of changes among the different elements cant
occur according to our prior knowledge. The set , {M , }
can be defined in introducing some integrity constraints as
done in the hybrid model of DSmT. M includes all the
transitions in Ti , i = 1, 2, . . . , n, which have been forced
to be empty because of the chosen integrity constraints in
the model M, and is classical empty set. If the sources of
evidence share the same reliability in the combination, the
conflict among the evidences will be regarded as possible
changes or as empty sets depending on the constraints we
have. The mass of empty sets arising from integrity constraints
can be distributed to the other focal elements. The notation
M
tA,B = t, means that the transition tA,B is equivalent to the
transition t in the underlying model M given the integrity
constraints.
1
0.6
0
0
2
0
1
0.5
, Xn 2n 2 , tn Tn , n 2
tn1 Tn1
P
m1n1 (tn1 )mn (Xn )
M
m1n (tn ) =
ttn1 ,Xn = tn
1K
(7)
1 2
0.4
0
0.5
ttn1 ,Xn
m1n (tn ) =
1K
(9)
where
K=
m1 (X1 ) mn (Xn ).
(10)
980
m1 0.4 0.6
0
m2 0.5 0.2 0.3
According to the underlying hybrid model M, only the
products m1 (1 )m2 (2 ) and m1 (2 )m2 (2 ) take part in the
conflict as: K = m1 (1 )m2 (2 ) + m1 (2 )m2 (2 ) = 0.2.
The conjunctive mass of belief of possible transitions are
given by
m (t1,1 ) = m1 (1 )m2 (1 ) = 0.20
m (t1,12 ) = m1 (1 )m2 (1 2 ) = 0.12
m (t2,1 ) = m1 (2 )m2 (1 ) = 0.30
m (t2,12 ) = m1 (2 )m2 (1 2 ) = 0.18
M
m(t1,1 ) =
t3,5 = tw4 ,w8 : {Red area}, t4,5 = tw6 ,w7 : {Dark yellow area}.
t3,5 and t4,5 correspond to actual changes and they are linked
to damage mapping (see Fig. 3). Fig. 3-(a) focus on those 2
981
Acknowledgements
This work is supported by China Natural Science Foundation (No.61075029) and PhD Thesis Innovation Fund from
Northwestern Polytechnical University (No.cx201015).
R EFERENCES
[1] A. Bouakache, A. Belhadj-Aissa, and G. Mercier, Satellite image fusion using Dezert-Smarandache theory, in
Advances and Applications of DSmT for Information
Fusion, F. Smarandache and J. Dezert, Eds. ARP, 2009,
vol. 3, ch. 22.
[2] G. Mercier, G. Moser, and S. Serpico, Conditional
Copula for Change Detection on Heterogeneous SAR
Data, IEEE Trans. Geosci. Remote Sensing, vol. 46,
no. 5, May 2008.
[3] G. Shafer, A Mathematical Theory of Evidence. Princeton Univ. Press, 1976.
[4] F. Smarandache and J. Dezert, Advances and Applications of DSmT for Information Fusion V1-3. Rehoboth,
USA: American Research Press, 2004-2009.
[5] S. Corgne, L. Hubert-Moy, and J. D. et al, Land cover
change prediction with a new theory of plausible and
a pradoxical reasoning, in Advances and Applications
of DSmT for Information Fusion, F. Smarandache and
J. Dezert, Eds. Am. Res. Press, Rehoboth, Jun. 2004.
[6] S. Hachicha and F. Chaabane, Application of DSM
theory for SAR image change detection, in Proceedings
of 2009 16th IEEE International Conference on Image
Processing (ICIP), Nov. 2009, pp. 37333736.
[7] W. Liu, Analyzing the degree of conflict among belief
functions, Artificial Intelligence, vol. 170, no. 11, pp.
909924, 2006.
[8] A. Martin, A. L. Jousselme, and C. Osswald, Conflict
measure for the discounting operation on belief functions, in Proceeding of Fusion, Germany, 2008.
[9] P. Smets, Decision making in the TBM: the necessity
of the pignistic transformation, Int. Jour. Approx. Reasoning, vol. 38, pp. 133147, 2005.
[10] , The combination of evidence in the transferable
belief model, IEEE Trans. Pattern Anal. Machine Intell.,
vol. 12, no. 5, pp. 447458, 1990.
[11] R. Andreoli, H. Yesou, and N. T. et al, Exploitation
en crise et post crise de donnees satellites haute et
tr`es haute resolution pour la cartographie de degats de
seismes. cas de Bam, Boumerd`es et Al Hoceima, in
Sirnat, Montpellier, Mar., 1011, 2005, (in french).
[12] M. H. Masson and T. Denoeux, ECM: An evidential
version of the fuzzy C-means algorithm, Pattern Recognition, vol. 41, pp. 13841397, 2008.
982
(a)
(a)
(b)
(b)
(c)
(c)
983
(a)
(b)
(c)
Figure 3. Significant damage map extracted from DER decision of Fig. 2).
(a) Changes from the 1st to 2nd classified image, (b) Changes from the 2nd
to 3rd classified image, (c) Changes through the 1st, 2nd and 3rd classified
images.
984